A program that defends against a port scanner will attempt to:
A.
Log a violation and recommend use of security-auditing tools
B.
Update a firewall rule in real time to prevent the port scan from being completed
C.
Sends back bogus data to the port scanner
D.
Limit access by the scanning system to publicly available ports only
Correct answer is B